Pick a pass like one of mine [email protected]# and let the robots crack it. Of course, not in english and make sure to use weird chars in your language.
M

Extremist conservative user, I wish to preserve human and civil rights, free speech, freedom of the press and worship, rule of law, democracy, peace and prosperity, social mobility, etc. Now you can draw your guns.

@gsrdgrdghd said: Just continue the same as before? I don't use any IPTables rules on my servers and i don't see any reason to do so.

This. IPTables dont help if you have vulnerable apps, and if they dont have known exploits, then IPTables are not needed.
So, keep your installation up to date by applying latest patches, not really by putting up the latest and greatest version, put up only what you need, listen only on the ports you need, if you access some ports only yourself, make them listen only locally and use port forwarding with ssh, etc...
M

Extremist conservative user, I wish to preserve human and civil rights, free speech, freedom of the press and worship, rule of law, democracy, peace and prosperity, social mobility, etc. Now you can draw your guns.

@Presbytis said: I pick password like "kawit esuk ketuk bengi ngantuk terus", its pretty easy to remember (my native language) but i think its long enough to prevent bruteforce. :)

Any long enough password is hard to bruteforce, but using only one type of letters is not good enough, even if you have space, which few ppl use :)
Best should have lowercase, uppercase, numbers, special chars (*&^% etc) and space as the cherry on the top :) Introducing only one of each is enough to skyrocket the number of combinations.
However, from what i saw, those attacks are really limited, saw passes tried such as kevin, lpt and even bob...
M

Extremist conservative user, I wish to preserve human and civil rights, free speech, freedom of the press and worship, rule of law, democracy, peace and prosperity, social mobility, etc. Now you can draw your guns.

additionally, changing services away from "standard" ports will prevent 99% of the bruteforce attacks. There's 4 billion other IPs to try out, why bother with spending time figuring out what port you've changed to